For Week 10, be sure to understand both information from the PDF as well as the slide show.

From the slides:

  • Different types of servers
  • The two different types of signals. (Analog vs Digital.)

  • What bandwith is and how it works (Plumbing pipes example)
  • Sendin information and how packets work
    • What a packet is
    • What happens as it's sent across a network
    • How the data finishes transmitting.
  • The two ways of sending data
  • What repeaters do
  • Protocols and how they work
  • What is an IP address made of and what does it represent

ALL keywords and definitions from the slides.
Notable Examples:

  • VPN A virtual private network (VPN) is a network that uses a public telecommunication infrastructure, such as the Internet, to provide remote offices or individual users with secure access to their organization's network
  • Wireless N
  • Backbone a larger transmission line that carries data gathered from smaller lines that interconnect with it.
  • Router a device or, in some cases, software in a computer, that determines the next network point to which apacket should be forwarded toward its destination.
  • Relevance connected to the matter at hand
  • Torrent
  • Packet Jam
  • Buffer Overflow A buffer overflow occurs when a program or process tries to store more data in a buffer(temporary data storage area) than it was intended to hold
  • Logic Bomb also called slag code, is programming code, inserted surreptitiously or intentionally, that is designed to execute (or "explode") under circumstances such as the lapse of a certain amount of time or the failure of a a program user to respond to a program command.
  • Social Engineering a term that describes a non-technical kind of intrusion that relies heavily on human interaction and often involves tricking other people to break normal security procedures.
  • Strong Passwords is one that is designed to be hard for a person or program to discover.
  • Confidentiality a set of rules or a promise that limits access or places restrictions on certain types of information.
  • Authentication the process of determining whether someone or something is, in fact, who or what it is declared to be.
  • Wireless G
  • Switch a device that channels incoming data from any of multiple input ports to the specific output port that will take the data toward its intended destination.
  • Internet 2 a collaboration among more than 100 U.S. universities to develop networking and advanced applications for learning and research.
  • TCP/IP (Transmission Control Protocol/Internet Protocol) is the basic communication language or protocol of the Internet.
  • Popularity the favor of the general public
  • Broadband refers to telecommunication in which a wide band of frequencies is available to transmit information.
  • IP address The Internet Protocol (IP) is the method or protocol by which data is sent from one computer to another on the Internet
  • Virus a program or programming code that replicates by being copied or initiating its copying to another program, computer boot sector or document.
  • Firewall A firewall is a set of related programs, located at a network gateway server, that protects the resources of a private network from users from other networks.
  • Spam is unsolicited e-mail on the Internet
  • PKI A PKI (public key infrastructure) enables users of a basically unsecure public network such as the Internet to securely and privately exchange data and money through the use of a public and a private cryptographic key pair that is obtained and shared through a trusted authority
  • Integrity is the assurance that information can only be accessed or modified by those authorized to do so.
  • DNS The domain name system (DNS) is the way that Internet domain names are located and translated intoInternet Protocol addresses.
  • Hub is the central part of a wheel where the spokes come together. is a place of convergence where data arrives from one or more directions and is forwarded out in one or more other directions.
  • LAN A local area network (LAN) is a group of computers and associated devices that share a common communications line or wireless link.
  • NLR
  • FTP File Transfer Protocol (FTP) is a standard Internet protocol for transmitting files between computers on the Internet
  • Bit is the smallest unit of data in a computer.
  • P2P On the Internet, peer-to-peer (referred to as P2P) is a type of transient Internet network that allows a group of computer users with the same networking program to connect with each other and directly access files from one another's hard drives.
  • Cookie A cookie is information that a Web site puts on your hard disk so that it can remember something about you at a later time.records your preferences when using a particular site

Things from the PDF of import:

Protocols - rules that ensure the orderly and accurate transmission and reception of data; start and end transmission, recognize error, sent data at the appropriate speed, and identify the correct senders and recipients

Handshaking - protocols helps help network devices negotiate and establish communications

Packets - the process by which you send a file or an e-mail over a network,the file is actually broken up into small pieces. It is a "parcel" of dad that is sent across a computer network

Packet Switching - the technology of dividing a message into several packets that can be routed or independently to their destination to avoid out-of-service or congested links

Circuit Switching - establishes a dedicated, private link between one telephone and another for the duration of a call; more efficient alternative to circuit switching

TCP/IP (Transmission Control Protocol/Internet Protocol) - breaks messages into packets and addresses them for the transmission over the Internet

HTTP (Hypertext Transfer Protocol) - Exchanges information over the web

FTP (File Transfer Protocol) - Transfers files between local and remote host computers

POP (Post Office Protocol) - Transfers mail from an e-mail server to a client inbox

SMTP (Simple Mail Transfer Protocol) - transfers e-mail messages from client computers to an e-mail server

IMAP (Internet Mail Access Protocol) - an alternative to POP

TELNET (Telecommunications Network) - allows users who are logged on to one host to access another host

SSL (Secure Sockets Layer) - Provides secure data transfer over the Internet

Ethernet - broadcasts data packets to all networks is accepted only by the device to which it is addressed

CSMA/CD Protocol (Carrier Senese Multiple Access with Collision Detection) - takes care of situation in which two network devices attempt to transmit packets at the same time

Uplink Port - simple step up from a basic single-humb network is to connect several hubs

Wi-Fi Network - transmits data as radio waves over predefined frequencies, much like cordless phones.

War Driving/LAN-Jacking - occurs when hackers cruise around with a Wi-Fi equipped notebook computer that is set up to search for Wi-Fi signals coming from home or corporate Wi-Fi networks. War drivers can access and use unsecured Wi-Fi networks

WEP (Wired Equivalent Privacy) - essential step in making Wi-Fi-transmitted data useless to intruders

Wi-Fi card - transmitter, receiver, and antenna to transmit signals

Wireless Access Point - provides a central point for data transmitted over a wireless network by broadcasting signals to any devices with compatible Wi-Fi cards

Bluetooth - short-range wireless network technology that is designed to make its own connections between electronic devices - without wires, cables or any direct action from a user

Network Service Providers (NSPs) - such as AT&T, backbone links and routers are maintained by NSPs

ISP (Internet Service Provider) - operates network devices that handle the physical aspect of transmitting and receiving data from your computer

Ping - (Packet Internet Grouper) - sends a signal to a specific Internet address and waits for a reply.

Traceroute - records packet's path, including intermediate routers from your computer to its destination

Domain name- An easy to remeber name that translates into a computer IP address

Top level domain- ex: ".com" ".org" ".edu" .com would imply the host name is owned by a commercial busniess

Voiceband modem- Usually refferred to as a modem, converts the digital signals from your computer into signals that can travel through telephone lines.

DSL(Digital Subscriber Line)- a high speed, digital, always on internet access technology that uses standard phonelines to transport data

ISDN (Integrated Services Digital Network)- connections move data faster that a dial-up connection, but not as fast as DSL or cable modems

DOCSIS (Date over cable service interface specification)- a security technology that filters packets to certain ports, including the port the windows operating system uses for network

Bandwidth- a communications channel like your CATV cable carries packets at a constant speed

DSS (digital sattellite servcie)- uses a geosynchronous or low-earth sattellite to transmit television, voice, or computer data directly to and from a sattelite dish or base station owned or leased by an individual

WAP (Wireless access protocol)- a communications protocol that provides wireless internet access from handheld devices, such as cell phones and pda's